default search action
BibTeX records: Johanna Amann
@inproceedings{DBLP:conf/sec/WilkensHA022, author = {Florian Wilkens and Steffen Haas and Johanna Amann and Mathias Fischer}, editor = {Weizhi Meng and Simone Fischer{-}H{\"{u}}bner and Christian Damsgaard Jensen}, title = {Passive, Transparent, and Selective {TLS} Decryption for Network Security Monitoring}, booktitle = {{ICT} Systems Security and Privacy Protection - 37th {IFIP} {TC} 11 International Conference, {SEC} 2022, Copenhagen, Denmark, June 13-15, 2022, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {648}, pages = {87--105}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06975-8\_6}, doi = {10.1007/978-3-031-06975-8\_6}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/WilkensHA022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/imc/2021, editor = {Dave Levin and Alan Mislove and Johanna Amann and Matthew Luckie}, title = {{IMC} '21: {ACM} Internet Measurement Conference, Virtual Event, USA, November 2-4, 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3487552}, doi = {10.1145/3487552}, isbn = {978-1-4503-9129-0}, timestamp = {Thu, 04 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-09828, author = {Florian Wilkens and Steffen Haas and Johanna Amann and Mathias Fischer}, title = {Passive, Transparent, and Selective {TLS} Decryption for Network Security Monitoring}, journal = {CoRR}, volume = {abs/2104.09828}, year = {2021}, url = {https://arxiv.org/abs/2104.09828}, eprinttype = {arXiv}, eprint = {2104.09828}, timestamp = {Mon, 26 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-09828.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/HolzHARJVH20, author = {Ralph Holz and Jens Hiller and Johanna Amann and Abbas Razaghpanah and Thomas Jost and Narseo Vallina{-}Rodriguez and Oliver Hohlfeld}, title = {Tracking the deployment of {TLS} 1.3 on the web: a story of experimentation and centralization}, journal = {Comput. Commun. Rev.}, volume = {50}, number = {3}, pages = {3--15}, year = {2020}, url = {https://doi.org/10.1145/3411740.3411742}, doi = {10.1145/3411740.3411742}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/HolzHARJVH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HillerAH20, author = {Jens Hiller and Johanna Amann and Oliver Hohlfeld}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in Public Key Infrastructures}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {1289--1306}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3423345}, doi = {10.1145/3372297.3423345}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HillerAH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tma/HolzPVACELNS20, author = {Ralph Holz and Diego Perino and Matteo Varvello and Johanna Amann and Andrea Continella and Nate Evans and Ilias Leontiadis and Christopher Natoli and Quirin Scheitle}, editor = {Georgios Smaragdakis and Anja Feldmann and Anna Brunstr{\"{o}}m and Gareth Tyson}, title = {A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web}, booktitle = {4th Network Traffic Measurement and Analysis Conference, {TMA} 2020, Berlin, Germany, June 10, 2020}, publisher = {{IFIP}}, year = {2020}, url = {http://dl.ifip.org/db/conf/tma/tma2020/tma2020-camera-paper29.pdf}, timestamp = {Fri, 01 Oct 2021 09:14:31 +0200}, biburl = {https://dblp.org/rec/conf/tma/HolzPVACELNS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-13239, author = {Ralph Holz and Diego Perino and Matteo Varvello and Johanna Amann and Andrea Continella and Nate Evans and Ilias Leontiadis and Christopher Natoli and Quirin Scheitle}, title = {A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web}, journal = {CoRR}, volume = {abs/2004.13239}, year = {2020}, url = {https://arxiv.org/abs/2004.13239}, eprinttype = {arXiv}, eprint = {2004.13239}, timestamp = {Sat, 02 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-13239.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-08772, author = {Jens Hiller and Johanna Amann and Oliver Hohlfeld}, title = {The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in Public Key Infrastructures}, journal = {CoRR}, volume = {abs/2009.08772}, year = {2020}, url = {https://arxiv.org/abs/2009.08772}, eprinttype = {arXiv}, eprint = {2009.08772}, timestamp = {Wed, 23 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-08772.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-12762, author = {Ralph Holz and Johanna Amann and Abbas Razaghpanah and Narseo Vallina{-}Rodriguez}, title = {The Era of {TLS} 1.3: Measuring Deployment and Use with Active and Passive Methods}, journal = {CoRR}, volume = {abs/1907.12762}, year = {2019}, url = {http://arxiv.org/abs/1907.12762}, eprinttype = {arXiv}, eprint = {1907.12762}, timestamp = {Fri, 02 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-12762.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/anrw/ScheitleCAGBCHH18, author = {Quirin Scheitle and Taejoong Chung and Johanna Amann and Oliver Gasser and Lexi Brent and Georg Carle and Ralph Holz and Jens Hiller and Johannes Naab and Roland van Rijswijk{-}Deij and Oliver Hohlfeld and David R. Choffnes and Alan Mislove}, title = {Measuring Adoption of Security Additions to the {HTTPS} Ecosystem}, booktitle = {Proceedings of the Applied Networking Research Workshop, {ANRW} 2018, Montreal, QC, Canada, July 16-16, 2018}, pages = {1--2}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3232755.3232756}, doi = {10.1145/3232755.3232756}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/anrw/ScheitleCAGBCHH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/anrw/RazaghpanahNVSA18, author = {Abbas Razaghpanah and Arian Akhavan Niaki and Narseo Vallina{-}Rodriguez and Srikanth Sundaresan and Johanna Amann and Phillipa Gill}, title = {Studying {TLS} Usage in Android Apps}, booktitle = {Proceedings of the Applied Networking Research Workshop, {ANRW} 2018, Montreal, QC, Canada, July 16-16, 2018}, pages = {5}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3232755.3232779}, doi = {10.1145/3232755.3232779}, timestamp = {Wed, 26 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/anrw/RazaghpanahNVSA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/ScheitleGNABCHS18, author = {Quirin Scheitle and Oliver Gasser and Theodor Nolte and Johanna Amann and Lexi Brent and Georg Carle and Ralph Holz and Thomas C. Schmidt and Matthias W{\"{a}}hlisch}, title = {The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem}, booktitle = {Proceedings of the Internet Measurement Conference 2018, {IMC} 2018, Boston, MA, USA, October 31 - November 02, 2018}, pages = {343--349}, publisher = {{ACM}}, year = {2018}, url = {https://dl.acm.org/citation.cfm?id=3278562}, timestamp = {Fri, 25 Oct 2019 09:51:49 +0200}, biburl = {https://dblp.org/rec/conf/imc/ScheitleGNABCHS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/KotziasRAPVC18, author = {Platon Kotzias and Abbas Razaghpanah and Johanna Amann and Kenneth G. Paterson and Narseo Vallina{-}Rodriguez and Juan Caballero}, title = {Coming of Age: {A} Longitudinal Study of {TLS} Deployment}, booktitle = {Proceedings of the Internet Measurement Conference 2018, {IMC} 2018, Boston, MA, USA, October 31 - November 02, 2018}, pages = {415--428}, publisher = {{ACM}}, year = {2018}, url = {https://dl.acm.org/citation.cfm?id=3278568}, timestamp = {Fri, 25 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/KotziasRAPVC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-08325, author = {Quirin Scheitle and Oliver Gasser and Theodor Nolte and Johanna Amann and Lexi Brent and Georg Carle and Ralph Holz and Thomas C. Schmidt and Matthias W{\"{a}}hlisch}, title = {The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem}, journal = {CoRR}, volume = {abs/1809.08325}, year = {2018}, url = {http://arxiv.org/abs/1809.08325}, eprinttype = {arXiv}, eprint = {1809.08325}, timestamp = {Fri, 05 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-08325.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/AmannS17, author = {Johanna Amann and Robin Sommer}, editor = {Gail{-}Joon Ahn and Guofei Gu and Hongxin Hu and Seungwon Shin}, title = {Viable Protection of High-Performance Networks through Hardware/Software Co-Design}, booktitle = {Proceedings of the {ACM} International Workshop on Security in Software Defined Networks {\&} Network Function Virtualization, SDN-NFVSec@CODASPY 2017, Scottsdale, Arizona, USA, March 24, 2017}, pages = {19--24}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3040992.3041003}, doi = {10.1145/3040992.3041003}, timestamp = {Tue, 06 Nov 2018 11:07:47 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/AmannS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/RazaghpanahNVSA17, author = {Abbas Razaghpanah and Arian Akhavan Niaki and Narseo Vallina{-}Rodriguez and Srikanth Sundaresan and Johanna Amann and Phillipa Gill}, title = {Studying {TLS} Usage in Android Apps}, booktitle = {Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies, CoNEXT 2017, Incheon, Republic of Korea, December 12 - 15, 2017}, pages = {350--362}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3143361.3143400}, doi = {10.1145/3143361.3143400}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/conext/RazaghpanahNVSA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/AmannGSBCH17, author = {Johanna Amann and Oliver Gasser and Quirin Scheitle and Lexi Brent and Georg Carle and Ralph Holz}, editor = {Steve Uhlig and Olaf Maennel}, title = {Mission accomplished?: {HTTPS} security after diginotar}, booktitle = {Proceedings of the 2017 Internet Measurement Conference, {IMC} 2017, London, United Kingdom, November 1-3, 2017}, pages = {325--340}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3131365.3131401}, doi = {10.1145/3131365.3131401}, timestamp = {Fri, 25 Oct 2019 09:51:18 +0200}, biburl = {https://dblp.org/rec/conf/imc/AmannGSBCH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pam/2017, editor = {Mohamed Ali K{\^{a}}afar and Steve Uhlig and Johanna Amann}, title = {Passive and Active Measurement - 18th International Conference, {PAM} 2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10176}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-54328-4}, doi = {10.1007/978-3-319-54328-4}, isbn = {978-3-319-54327-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pam/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SommerAH16, author = {Robin Sommer and Johanna Amann and Seth Hall}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Spicy: a unified deep packet inspection framework for safely dissecting all your data}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {558--569}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991100}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SommerAH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/VanderSlootABDB16, author = {Benjamin VanderSloot and Johanna Amann and Matthew Bernhard and Zakir Durumeric and Michael D. Bailey and J. Alex Halderman}, editor = {Phillipa Gill and John S. Heidemann and John W. Byers and Ramesh Govindan}, title = {Towards a Complete View of the Certificate Ecosystem}, booktitle = {Proceedings of the 2016 {ACM} on Internet Measurement Conference, {IMC} 2016, Santa Monica, CA, USA, November 14-16, 2016}, pages = {543--549}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2987462}, timestamp = {Thu, 26 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/VanderSlootABDB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/HolzAMKW16, author = {Ralph Holz and Johanna Amann and Olivier Mehani and Mohamed Ali K{\^{a}}afar and Matthias Wachs}, title = {{TLS} in the Wild: An Internet-wide Analysis of TLS-based Protocols for Electronic Communication}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/tls-wild-internet-wide-analysis-tls-based-protocols-electronic-communication.pdf}, timestamp = {Thu, 17 Jun 2021 16:04:48 +0200}, biburl = {https://dblp.org/rec/conf/ndss/HolzAMKW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pam/AmannS16, author = {Johanna Amann and Robin Sommer}, editor = {Thomas Karagiannis and Xenofontas A. Dimitropoulos}, title = {Exploring Tor's Activity Through Long-Term Passive {TLS} Traffic Measurement}, booktitle = {Passive and Active Measurement - 17th International Conference, {PAM} 2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9631}, pages = {3--15}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-30505-9\_1}, doi = {10.1007/978-3-319-30505-9\_1}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/pam/AmannS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pam/ZhuAH16, author = {Liang Zhu and Johanna Amann and John S. Heidemann}, editor = {Thomas Karagiannis and Xenofontas A. Dimitropoulos}, title = {Measuring the Latency and Pervasiveness of {TLS} Certificate Revocation}, booktitle = {Passive and Active Measurement - 17th International Conference, {PAM} 2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9631}, pages = {16--29}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-30505-9\_2}, doi = {10.1007/978-3-319-30505-9\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pam/ZhuAH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CaselliZASK16, author = {Marco Caselli and Emmanuele Zambon and Johanna Amann and Robin Sommer and Frank Kargl}, editor = {Thorsten Holz and Stefan Savage}, title = {Specification Mining for Intrusion Detection in Networked Control Systems}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {791--806}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/caselli}, timestamp = {Mon, 01 Feb 2021 08:43:18 +0100}, biburl = {https://dblp.org/rec/conf/uss/CaselliZASK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/AmannS15, author = {Johanna Amann and Robin Sommer}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Providing Dynamic Control to Passive Network Security Monitoring}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {133--152}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_7}, doi = {10.1007/978-3-319-26362-5\_7}, timestamp = {Sun, 25 Oct 2020 22:56:09 +0100}, biburl = {https://dblp.org/rec/conf/raid/AmannS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HolzAMWK15, author = {Ralph Holz and Johanna Amann and Olivier Mehani and Matthias Wachs and Mohamed Ali K{\^{a}}afar}, title = {{TLS} in the wild: an Internet-wide analysis of TLS-based protocols for electronic communication}, journal = {CoRR}, volume = {abs/1511.00341}, year = {2015}, url = {http://arxiv.org/abs/1511.00341}, eprinttype = {arXiv}, eprint = {1511.00341}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/HolzAMWK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tinytocs/AmannSVH15, author = {Johanna Amann and Robin Sommer and Matthias Vallentin and Seth Hall}, title = {To Trust, or not to Trust, that is the Question: Structural Properties of {X.509} Certificates}, journal = {Tiny Trans. Comput. Sci.}, volume = {3}, year = {2015}, url = {http://tinytocs.org/vol3/papers/TinyToCS\_3\_amann.pdf}, timestamp = {Tue, 14 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tinytocs/AmannSVH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/Vallina-RodriguezAKWP14, author = {Narseo Vallina{-}Rodriguez and Johanna Amann and Christian Kreibich and Nicholas Weaver and Vern Paxson}, editor = {Aruna Seneviratne and Christophe Diot and Jim Kurose and Augustin Chaintreau and Luigi Rizzo}, title = {A Tangled Mass: The Android Root Certificate Stores}, booktitle = {Proceedings of the 10th {ACM} International on Conference on emerging Networking Experiments and Technologies, CoNEXT 2014, Sydney, Australia, December 2-5, 2014}, pages = {141--148}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2674005.2675015}, doi = {10.1145/2674005.2675015}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/conext/Vallina-RodriguezAKWP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/DurumericKAHBLWABPP14, author = {Zakir Durumeric and James Kasten and David Adrian and J. Alex Halderman and Michael D. Bailey and Frank Li and Nicholas Weaver and Johanna Amann and Jethro Beekman and Mathias Payer and Vern Paxson}, editor = {Carey Williamson and Aditya Akella and Nina Taft}, title = {The Matter of Heartbleed}, booktitle = {Proceedings of the 2014 Internet Measurement Conference, {IMC} 2014, Vancouver, BC, Canada, November 5-7, 2014}, pages = {475--488}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2663716.2663755}, doi = {10.1145/2663716.2663755}, timestamp = {Thu, 26 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/DurumericKAHBLWABPP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/AmannHS14, author = {Johanna Amann and Seth Hall and Robin Sommer}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {Count Me In: Viable Distributed Summary Statistics for Securing High-Speed Networks}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {320--340}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_16}, doi = {10.1007/978-3-319-11379-1\_16}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/AmannHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AmannSVH13, author = {B. Amann and Robin Sommer and Matthias Vallentin and Seth Hall}, editor = {Charles N. Payne Jr.}, title = {No attack necessary: the surprising dynamics of {SSL} trust relationships}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {179--188}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523665}, doi = {10.1145/2523649.2523665}, timestamp = {Thu, 08 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/AmannSVH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/AkhaweAVS13, author = {Devdatta Akhawe and B. Amann and Matthias Vallentin and Robin Sommer}, editor = {Daniel Schwabe and Virg{\'{\i}}lio A. F. Almeida and Hartmut Glaser and Ricardo Baeza{-}Yates and Sue B. Moon}, title = {Here's my cert, so trust me, maybe?: understanding {TLS} errors on the web}, booktitle = {22nd International World Wide Web Conference, {WWW} '13, Rio de Janeiro, Brazil, May 13-17, 2013}, pages = {59--70}, publisher = {International World Wide Web Conferences Steering Committee / {ACM}}, year = {2013}, url = {https://doi.org/10.1145/2488388.2488395}, doi = {10.1145/2488388.2488395}, timestamp = {Wed, 07 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/AkhaweAVS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/AmannSSH12, author = {B. Amann and Robin Sommer and Aashish Sharma and Seth Hall}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {314--333}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_16}, doi = {10.1007/978-3-642-33338-5\_16}, timestamp = {Thu, 08 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/AmannSSH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Amann11, author = {Johanna Amann}, title = {Redundancy and access permissions in decentralized file systems}, school = {Technical University Munich}, year = {2011}, url = {https://nbn-resolving.org/urn:nbn:de:bvb:91-diss-20110905-1079733-0-6}, urn = {urn:nbn:de:bvb:91-diss-20110905-1079733-0-6}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Amann11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/p2p/AmannF10, author = {B. Amann and Thomas Fuhrmann}, title = {Cryptographically Enforced Permissions for Fully Decentralized File Systems}, booktitle = {{IEEE} Tenth International Conference on Peer-to-Peer Computing, {P2P} 2010, Delft, The Netherlands, 25-27 August 2010}, pages = {1--10}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/P2P.2010.5569990}, doi = {10.1109/P2P.2010.5569990}, timestamp = {Thu, 08 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/p2p/AmannF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sss/HouriAF10, author = {Yaser Houri and B. Amann and Thomas Fuhrmann}, editor = {Shlomi Dolev and Jorge Arturo Cobb and Michael J. Fischer and Moti Yung}, title = {A Quantitative Analysis of Redundancy Schemes for Peer-to-Peer Storage Systems}, booktitle = {Stabilization, Safety, and Security of Distributed Systems - 12th International Symposium, {SSS} 2010, New York, NY, USA, September 20-22, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6366}, pages = {519--530}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16023-3\_40}, doi = {10.1007/978-3-642-16023-3\_40}, timestamp = {Thu, 08 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sss/HouriAF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/p2p/AmannEHF08, author = {B. Amann and Benedikt Elser and Yaser Houri and Thomas Fuhrmann}, editor = {Klaus Wehrle and Wolfgang Kellerer and Sandeep K. Singhal and Ralf Steinmetz}, title = {IgorFs: {A} Distributed {P2P} File System}, booktitle = {Proceedings P2P'08, Eighth International Conference on Peer-to-Peer Computing, 8-11 September 2008, Aachen, Germany}, pages = {77--78}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/P2P.2008.19}, doi = {10.1109/P2P.2008.19}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/p2p/AmannEHF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.